The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

Compliance – Data Sovereignty and the Cloud

The rapid adoption and popularity of cloud and SaaS applications such as Microsoft Office 365 have introduced a better way to collaborate and share data, providing businesses with improvements in efficiency and lowered IT costs. SaaS and cloud computing are changing...

HOW TO PROTECT YOUR BUSINESS AGAINST RANSOMWARE

Conduct proper and timely backups of your data so it can be used to restore original files after a data loss event Use a security solution (Kaspersky is an excellent example) with behaviour based detection technologies. These technologies can catch malware, including...

Yahoo closing down Mail App for Windows 10

The Yahoo Mail app for Windows 10 is shutting down and will stop working next week. The company is already notifying users of the app that it will no longer function after Monday, 22nd May. The message says, “Your Windows 10 app will stop working after May 22. Thank...

Keylogger Discovered in HP Audio Driver

If you own or use a HP computer it’s time to check whether either C:\Windows\System32\MicTray64.exe or C:\Windows\System32\MicTray.exe in installed. If either is, you have an active keylogger recording all key presses and need to take action by renaming the...

Office 365 Mailbox Backups

Although Microsoft Office 365 is a cloud service, regular backups provide an additional layer of protection from user errors and intentional malicious actions. Our Acronis Office 365 Mailbox Backup solution helps prevent against data loss with 24/7 backup for...

Why create a Virtual Machine (VM)?

VMs allow you to experiment with other operating systems. They allow you to work safely with more reliability and security: VMs are essentially like working in a sandbox environment (see * note). Working within such a controlled environment when running programs is a...

Microsoft Fixes Serious Windows Defender Bug

Over the weekend, Google’s Project Zero researchers Tavis Ormandy and Natalie Silvanovich tweeted about discovering what Tavis referred to as “the worst Windows remote code exec in recent memory. This is crazy bad.” This bug could work against a default installation...

What is a Virtual Machine (VM)

A virtual machine is a computer application or file (typically called an image) that behaves like an actual computer. It runs on your current operating system in a window on your desktop to allow you to experiment with different operating systems, just like you would...

How To Change Office 365 App Passwords

1 – Log into the Office 365 portal (http://portal.office.com) and click your photo in the top-right of the page 2 – Click View Account 3 – Click the Security and Privacy menu to the left or the Manage Security and Privacy link on the main area of the...

Office 365 Hits 100 Million Users

The last time Microsoft commented formally, they claimed 85 million active monthly Office 365 users in October 2016. On their April 27 analyst call to discuss Q3 FY17 results, CEO Satya Nadella said that the new number is “more than 100 million monthly active users.”...

Office 365 – Advanced Threat Protection Update

According to a recent Ponemon Institute study,* the average cost of a data breach has risen to $4 million, with costs incurred for litigation, brand or reputation damage, lost sales and in some cases—complete business closure. Staying ahead of threats has never been...